Description
A vulnerability has been found in janet-lang janet up to 1.40.1. The impacted element is the function janetc_pop_funcdef of the file src/core/compile.c. Such manipulation leads to out-of-bounds read. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The name of the patch is 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5. A patch should be applied to remediate this issue.
Published: 2026-02-09
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

A flaw in the Janet compiler’s janetc_pop_funcdef routine allows an out‑of‑bounds read, exposing memory contents in the process. The vulnerability is a typical buffer overread type (CWE‑119, CWE‑125) that can leak sensitive data without modifying it. The attack requires local privilege and does not directly trigger code execution or denial of service.

Affected Systems

Janet-lang’s Janet interpreter, versions up to 1.40.1, including the 1.40.x releases and any builds that incorporate the unpatched commit. The issue resides in src/core/compile.c and has been fixed by commit 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5.

Risk and Exploitability

The CVSS score of 4.8 indicates low‑medium severity, and the EPSS score of less than 1% suggests a very low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Because the exploit requires local execution, it is unlikely to be leveraged remotely, but it remains a concern for environments where untrusted code may run under local privileges.

Generated by OpenCVE AI on April 17, 2026 at 21:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Janet to a version that includes commit 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5 or newer.
  • If building from source, apply the patch from the referenced commit directly to the repository.
  • Limit the execution of Janet scripts to trusted users and consider adding filesystem access controls to minimize the impact of local exploitation.

Generated by OpenCVE AI on April 17, 2026 at 21:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:janet-lang:janet:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Janet-lang
Janet-lang janet
Vendors & Products Janet-lang
Janet-lang janet

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in janet-lang janet up to 1.40.1. The impacted element is the function janetc_pop_funcdef of the file src/core/compile.c. Such manipulation leads to out-of-bounds read. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The name of the patch is 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5. A patch should be applied to remediate this issue.
Title janet-lang janet compile.c janetc_pop_funcdef out-of-bounds
Weaknesses CWE-119
CWE-125
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Janet-lang Janet
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:00:07.480Z

Reserved: 2026-02-09T09:38:25.338Z

Link: CVE-2026-2240

cve-icon Vulnrichment

Updated: 2026-02-09T16:06:41.157Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T16:16:03.223

Modified: 2026-02-25T14:43:19.533

Link: CVE-2026-2240

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:30:28Z

Weaknesses